Rust for Malware Development

Never, Ever, Ever Use Pixelation for Redacting Text

Never Use Text Pixelation To Redact Sensitive Information

Never use text pixelation to redact sensitive information

XMPP: An Under-Appreciated Attack Surface

Lexss: Bypassing Lexical Parsing Security Controls

An Exploration of JSON Interoperability Vulnerabilities

The Stolen FireEye Red Team Tools Are Mostly Open Source

Cheating at Online Video Games and What It Can Teach Us About AppSec (Part 1)

Design Considerations for Secure GraphQL APIs

OOB to RCE: Exploitation of the Hobbes Functional Interpreter

Investigating Privilege Escalation Methods in AWS

CVE-2019-11510: Pre-Authentication Arbitrary File Read Vulnerability (Exploit)

Hello World! Introducing the Bishop Fox Cybersecurity Style Guide

A Bug Has No Name: Multiple Heap Buffer Overflows in the Windows DNS Client

Hot New ‘Anonymous’ Chat App Sarahah Hijacks Millions of Contact Data

If You Can't Break Crypto, Break the Client: Recovery of Plaintext iMessage Data

In the News: A BGP Hijacking Technical Post-Mortem

An Overview of BGP Hijacking (2015)

If You Can’t Break Crypto, Break the Client: Recovery of Plaintext iMessage Data

Google Hacking Diggity Project

The Active Directory Kill Chain: Is Your Company at Risk?